Command Injection Vulnerability in TP-LINK Routers
CVE-2023-31188
8HIGH
Key Information:
- Vendor
- Tp-link
- Vendor
- CVE Published:
- 6 September 2023
Summary
A vulnerability exists in multiple TP-LINK Archer routers that allows a network-adjacent authenticated attacker to execute arbitrary OS commands. This issue arises due to improper validation of input, permitting malicious actions through crafted requests. Users of the Archer C50, C55, and C20 routers must promptly update their firmware to ensure protection from potential exploitation. Detailed firmware versions that require updating are listed in the affected products section.
Affected Version(s)
Archer C20 firmware versions prior to 'Archer C20(JP)_V1_230616'
Archer C50 firmware versions prior to 'Archer C50(JP)_V3_230505'
Archer C55 firmware versions prior to 'Archer C55(JP)_V1_230506'
References
CVSS V3.1
Score:
8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved